CIS Logo
tagline: Confidence in the Connected World


Multiple vulnerabilities have been discovered in Google Chrome, the most severe of which could allow for arbitrary code execution.



Multiple vulnerabilities have been identified in Mozilla Thunderbird, the most severe of which could allow for arbitrary code execution.



Multiple vulnerabilities have been discovered in Google Chrome, the most severe of which could allow for arbitrary code execution.



Multiple vulnerabilities have been discovered in Microsoft products, the most severe of which could allow for remote code execution.



Multiple vulnerabilities have been discovered in Adobe Flash Player which could allow for arbitrary code execution.



A vulnerability has been discovered in Exim, which could allow for unauthenticated remote attackers to execute arbitrary system commands when initiating TLS connections to affected mail servers.



Multiple vulnerabilities have been discovered in Mozilla Firefox and Firefox Extended Support Release (ESR), the most severe of which could allow for arbitrary code execution.



Multiple vulnerabilities have been discovered in the Google Android operating system (OS), the most severe of which could allow for arbitrary code execution.



Multiple vulnerabilities have been discovered in PHP, the most severe of which could allow for arbitrary code execution.



A vulnerability has been discovered in Google Chrome, which could allow for arbitrary code execution.



A vulnerability has been discovered in Apple iOS, which could allow for arbitrary code execution.



Multiple vulnerabilities have been discovered in Microsoft products, the most severe of which could allow for remote code execution.



Multiple vulnerabilities have been discovered in Adobe Photoshop CC, the most severe of which could allow for arbitrary code execution.



Multiple vulnerabilities have been discovered in Adobe Acrobat and Adobe Reader, the most severe of which could allow for arbitrary code execution.



Multiple vulnerabilities have been discovered in Cisco Small Business 220 Series Smart Switches, the most severe of which could allow an unauthenticated, remote attacker to execute arbitrary code with root privileges on a targeted system.



1 2 3 47